Cybersecurity

Cybersecurity
Scottish Man Pleads Guilty in $8 Million Cryptocurrency Heist
A Scottish man pleads guilty in a US court to a cryptocurrency theft using phishing and SIM-swap tactics.
Cyberattacks Are Outpacing MSP and Corporate Defenses
Cybersecurity
Cyberattacks Are Outpacing MSP and Corporate Defenses
Discover cybersecurity strategies to counter evolving threats in an upcoming webinar focused on security and recovery.
Huntress Identifies Active Exploitation of Microsoft Defender Vulnerabilities
Application Security
Huntress Identifies Active Exploitation of Microsoft Defender Vulnerabilities
Huntress identifies threat actors exploiting vulnerabilities in Microsoft Defender.
Lawmakers' Concerns About AI Include Worries of Potential 'Destruction'
Cybersecurity
Lawmakers’ Concerns About AI Include Worries of Potential ‘Destruction’
Lawmakers discuss the rapid development of AI, expressing fears over its potential impact on various global aspects.
Microsoft Edge Update Introduces Bug Affecting Microsoft Teams Chats
Application Security
Microsoft Edge Update Introduces Bug Affecting Microsoft Teams Chats
A recent update in the Microsoft Edge browser has led to a bug impacting the right-click paste function in Microsoft Teams chats.
Attackers Exploit QEMU Virtualization to Evade Detection
CVE Vulnerability Alerts
Attackers Exploit Three Zero-Day Flaws in Microsoft Defender to Gain Elevated Access
Three zero-day flaws in Microsoft Defender, dubbed BlueHammer, RedSun, and UnDefend, are being actively exploited to gain elevated system access.
Vercel Suffers Security Breach as Threat Actors Attempt to Sell Stolen Data
Cybersecurity
Vercel Suffers Security Breach as Threat Actors Attempt to Sell Stolen Data
Vercel's recent security breach exposes unauthorized data access as threat actors intend to sell compromised information from their systems.
AI Security Challenges - Vendors' Dual Messaging Raises Questions
Cybersecurity
AI Security Challenges: Vendors’ Dual Messaging Raises Questions
AI vendors promote AI for security while denying its flaws. This raises questions about their maturity and transparency.
NIST Alters Approach to Vulnerability Assessments, Ceasing Severity Scores for Lower-Priority Issues
Cybersecurity
NIST Alters Approach to Vulnerability Assessments, Ceasing Severity Scores for Lower-Priority Issues
NIST plans to halt severity scoring for lower-priority vulnerabilities due to high submission volumes.
Hackers Target Trucking and Logistics Firms in Organized Crime-Linked Cyber Campaign
Cybersecurity
Hackers Target Trucking and Logistics Firms in Organized Crime-Linked Cyber Campaign
Hackers linked to organized crime infiltrate logistics companies, posing rising threats of cargo theft and payment diversion.